Journal: Electronic Notes in Theoretical Computer Science

Volume 197, Issue 2

1 -- 2Luca Compagna, Volkmar Lotz, Fabio Massacci. Preface
3 -- 14Todd R. Andel, Alec Yasinsac. Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols
15 -- 29Atle Refsdal, Ketil Stølen. Extending UML Sequence Diagrams to Model Trust-dependent Behavior With the Aim to Support Risk Analysis
31 -- 43Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic. Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
45 -- 56Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews. Managing Conflicts of Interest in Virtual Organisations
57 -- 71Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, F. S. Proto, Simone Teofili. The SPARTA Pseudonym and Authorization System
73 -- 89Adam Wierzbicki. The Case for Fairness of Trust Management
91 -- 103J. F. Zandbelt, R. J. Hulsebosch, Mortaza S. Bargh, R. Arends. Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using DNSSEC
105 -- 119Gabriele Lenzini, Mortaza S. Bargh, Bob Hulsebosch. Trust-enhanced Security in Location-based Adaptive Authentication
121 -- 129Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna. Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
131 -- 140Jared Cordasco, Susanne Wetzel. Cryptographic Versus Trust-based Methods for MANET Routing Security
141 -- 148Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V. Lokam, P. L. Montgomery, R. Venkatesan, Yacov Yacobi. Vulnerabilities in Anonymous Credential Systems
149 -- 157Alessandro Basso, Michele Miraglia. Avoiding Massive Automated Voting in Internet Polls
159 -- 167Ton van Deursen, Paul Koster, Milan Petkovic. Hedaquin: A Reputation-based Health Data Quality Indicator
169 -- 177Joachim Biskup, Julia Hielscher, Sandra Wortmann. A Trust- and Property-based Access Control Model

Volume 197, Issue 1

1 -- 2Fabio Massacci, Frank Piessens. Preface
3 -- 16Srijith Krishnan Nair, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum. A Virtual Machine Based Information Flow Control System for Policy Enforcement
17 -- 30David Aspinall, Patrick Maier, Ian Stark. Monitoring External Resources in Java MIDP
31 -- 43Tom Goovaerts, Bart De Win, Wouter Joosen. Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
45 -- 58Irem Aktug, Katsiaryna Naliuka. ConSpec - A Formal Language for Policy Specification
59 -- 72Dries Schellekens, Brecht Wyseur, Bart Preneel. Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
73 -- 85Sid Stamm, Nicholas Paul Sheppard, Reihaneh Safavi-Naini. Implementing Trusted Terminals with a and SITDRM